|
|
d0db73 |
#
|
|
|
d0db73 |
# LDAP Defaults
|
|
|
d0db73 |
#
|
|
|
d0db73 |
|
|
|
d0db73 |
# See ldap.conf(5) for details
|
|
|
d0db73 |
# This file should be world readable but not world writable.
|
|
|
d0db73 |
|
|
|
d0db73 |
#BASE dc=example,dc=com
|
|
|
d0db73 |
#URI ldap://ldap.example.com ldap://ldap-master.example.com:666
|
|
|
d0db73 |
|
|
|
d0db73 |
#SIZELIMIT 12
|
|
|
d0db73 |
#TIMELIMIT 15
|
|
|
d0db73 |
#DEREF never
|
|
|
d0db73 |
|
|
|
d0db73 |
# When no CA certificates are specified the Shared System Certificates
|
|
|
d0db73 |
# are in use. In order to have these available along with the ones specified
|
|
|
d0db73 |
# by TLS_CACERTDIR one has to include them explicitly:
|
|
|
d0db73 |
#TLS_CACERT /etc/pki/tls/cert.pem
|
|
|
d0db73 |
|
|
|
d0db73 |
# System-wide Crypto Policies provide up to date cipher suite which should
|
|
|
d0db73 |
# be used unless one needs a finer grinded selection of ciphers. Hence, the
|
|
|
d0db73 |
# PROFILE=SYSTEM value represents the default behavior which is in place
|
|
|
d0db73 |
# when no explicit setting is used. (see openssl-ciphers(1) for more info)
|
|
|
d0db73 |
#TLS_CIPHER_SUITE PROFILE=SYSTEM
|
|
|
d0db73 |
|
|
|
d0db73 |
# Turning this off breaks GSSAPI used with krb5 when rdns = false
|
|
|
d0db73 |
SASL_NOCANON on
|
|
|
d0db73 |
|